On 06/13/07 14:00, str0ke wrote: > Are you sure that authentication is needed for this to be exploitable? No, it's not. The admin just needs to tweak permissions so that anonymous users have access to it. George -- theall at tenablesecurity.com